WO2011146232A2 - Trusted e-mail communication in a multi-tenant environment - Google Patents

Trusted e-mail communication in a multi-tenant environment Download PDF

Info

Publication number
WO2011146232A2
WO2011146232A2 PCT/US2011/034800 US2011034800W WO2011146232A2 WO 2011146232 A2 WO2011146232 A2 WO 2011146232A2 US 2011034800 W US2011034800 W US 2011034800W WO 2011146232 A2 WO2011146232 A2 WO 2011146232A2
Authority
WO
WIPO (PCT)
Prior art keywords
message
mail
organization
attribution
trusted
Prior art date
Application number
PCT/US2011/034800
Other languages
English (en)
French (fr)
Other versions
WO2011146232A3 (en
Inventor
Gregory Gourevitch
Victor William Habib Boctor
Wilbert De Graaf
Original Assignee
Microsoft Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN201180025046.3A priority Critical patent/CN102918810B/zh
Priority to KR1020177027593A priority patent/KR101903923B1/ko
Priority to JP2013512630A priority patent/JP6092098B2/ja
Priority to BR112012029427-0A priority patent/BR112012029427B1/pt
Priority to AU2011256698A priority patent/AU2011256698B2/en
Priority to RU2012149431/08A priority patent/RU2569806C2/ru
Application filed by Microsoft Corporation filed Critical Microsoft Corporation
Priority to EP11783939.9A priority patent/EP2572328B1/en
Priority to CA2798124A priority patent/CA2798124C/en
Priority to KR1020127030390A priority patent/KR101784756B1/ko
Publication of WO2011146232A2 publication Critical patent/WO2011146232A2/en
Publication of WO2011146232A3 publication Critical patent/WO2011146232A3/en
Priority to HK13107971.3A priority patent/HK1180853A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/60Business processes related to postal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/48Message addressing, e.g. address format or anonymous messages, aliases

Definitions

  • FIG. 4 is a block diagram of a system including a computing device.
  • multi-tenant hosting provider 120 may send an "EHLO" command to stand-alone organization 1 10 via SMTP.
  • Stand-alone organization 1 10 may reply with a list of supported SMTP extensions, such as "DSN,” “STARTTLS,” and/or "SIZE". Consistent with embodiments of the invention, stand-alone organization 1 10 may indicate in the reply that it supports an attribution data element extension, such as by including an extension name of "XOORG" in the list of supported extensions.
  • FIG. 2 is a flow chart setting forth the general stages involved in a method 200 consistent with embodiments of the invention for providing message source validation and attribution.
  • Method 200 may be implemented using a computing device 400 as described in more detail below with respect to FIG. 4. Ways to implement the stages of method 200 will be described in greater detail below.
  • Method 200 may begin at starting block 205 and proceed to stage 210 where computing device 400 may receive a message from a source organization.
  • multi-tenant hosting provider 120 may receive a message from hosting tenant 125(A) for a recipient at stand-alone system 1 10
  • the multi-tenant system may validate hosting tenants (e.g., hosting tenants 125(A)-B) and/or filtering tenants 135(A)-(B)), such as by requiring verifiable changes be made to domain ownership records by organizations seeking to host their e-mail communications associated with a given domain at multi-tenant host provider 120 and/or utilize services provided by multi-tenant e-mail filtering provider 130.
  • hosting tenants e.g., hosting tenants 125(A)-B
  • filtering tenants 135(A)-(B) such as by requiring verifiable changes be made to domain ownership records by organizations seeking to host their e-mail communications associated with a given domain at multi-tenant host provider 120 and/or utilize services provided by multi-tenant e-mail filtering provider 130.
  • the multi-tenant system may also be operative to identify a sender of messages received by the multi-tenant system for delivery to one of its tenants.
  • the multi-tenant system may have sufficient data (e.g. a fully qualified domain name (FQDN) in a message source organization's certificate) to identify stand-alone system 110 and may reliably attribute incoming messages to the first party based on a securely authenticated communication channel.
  • FQDN fully qualified domain name
  • computing device 400 may, for example, use an SMTP protocol extension.
  • An XOORG command may be implemented within the SMTP framework and/or an XOORG parameter may be included in the existing "MAIL FROM:" command within the SMTP standard framework.
  • the separate XOORG command may be used to transmit attribution data associated with multiple messages transmitted from a given source organization (e.g., a particular tenant from a multi-tenant system) during a single SMTP session while the XOORG parameter of the "MAIL FROM:” command may be varied for each message.
  • the protocol extension may allow the receiving system to decide whether a message may be trusted before all the recipients and actual message data is received.
  • the attribution data may be added to the message itself and transmitted in a header such as "X-Originator Organization".
  • the value of the header may comprise the identity of the organization on whose behalf the message is being sent, and may comprise a fully -qualified domain name.
  • the SMTP extension and the header are not mutually-exclusive and both may be provided.
  • the data supplied in the protocol parameter may take precedence over the header value. If a discrepancy is detected by the receiving MTA, it may re-stamp the header to match the protocol parameter value.
  • a system consistent with an embodiment of the invention may include a computing device, such as computing device 400.
  • computing device 400 may include at least one processing unit 402 and a system memory 404.
  • system memory 404 may comprise, but is not limited to, volatile (e.g. random access memory (RAM)), nonvolatile (e.g. read-only memory (ROM)), flash memory, or any combination.
  • System memory 404 may include operating system 405, one or more programming modules 406, and may include a message transport agent (MTA) 407.
  • Operating system 405, for example, may be suitable for controlling computing device 400' s operation.
  • Embodiments of the invention may be practiced in conjunction with a graphics library, other operating systems, or any other application program and is not limited to any particular application or system. This basic configuration is illustrated in FIG. 4 by those components within a dashed line 408.
  • Computing device 400 may have additional features or functionality.
  • computing device 400 may also include additional data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape.
  • additional storage is illustrated in FIG. 4 by a removable storage 409 and a non-removable storage 410.
  • Computing device 400 may also contain a communication connection 416 that may allow device 400 to communicate with other computing devices 418, such as over a network in a distributed computing environment, for example, an intranet or the Internet.
  • Communication connection 416 is one example of communication media.
  • embodiments of the present invention may take the form of a computer program product on a computer-usable or computer- readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system.
  • a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
PCT/US2011/034800 2010-05-21 2011-05-02 Trusted e-mail communication in a multi-tenant environment WO2011146232A2 (en)

Priority Applications (10)

Application Number Priority Date Filing Date Title
KR1020177027593A KR101903923B1 (ko) 2010-05-21 2011-05-02 멀티-테넌트 환경 내에서의 신뢰되는 전자 우편 통신
JP2013512630A JP6092098B2 (ja) 2010-05-21 2011-05-02 マルチテナント環境における信頼できる電子メール通信
BR112012029427-0A BR112012029427B1 (pt) 2010-05-21 2011-05-02 Método para fornecer comunicação por e-mail confiável, meio legível por computador e sistema para fornecer a comunicação por e-mail confiável
AU2011256698A AU2011256698B2 (en) 2010-05-21 2011-05-02 Trusted e-mail communication in a multi-tenant environment
RU2012149431/08A RU2569806C2 (ru) 2010-05-21 2011-05-02 Доверенная связь по электронной почте в многопользовательской среде
CN201180025046.3A CN102918810B (zh) 2010-05-21 2011-05-02 用于多承租人环境中的可信电子邮件通信的方法和系统
EP11783939.9A EP2572328B1 (en) 2010-05-21 2011-05-02 Trusted e-mail communication in a multi-tenant environment
CA2798124A CA2798124C (en) 2010-05-21 2011-05-02 Trusted e-mail communication in a multi-tenant environment
KR1020127030390A KR101784756B1 (ko) 2010-05-21 2011-05-02 멀티-테넌트 환경 내에서의 신뢰되는 전자 우편 통신
HK13107971.3A HK1180853A1 (zh) 2010-05-21 2013-07-09 用於多承租人環境中的可信電子郵件通信的方法和系統

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/785,348 US8707420B2 (en) 2010-05-21 2010-05-21 Trusted e-mail communication in a multi-tenant environment
US12/785,348 2010-05-21

Publications (2)

Publication Number Publication Date
WO2011146232A2 true WO2011146232A2 (en) 2011-11-24
WO2011146232A3 WO2011146232A3 (en) 2012-01-19

Family

ID=44973578

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/034800 WO2011146232A2 (en) 2010-05-21 2011-05-02 Trusted e-mail communication in a multi-tenant environment

Country Status (11)

Country Link
US (2) US8707420B2 (ru)
EP (1) EP2572328B1 (ru)
JP (1) JP6092098B2 (ru)
KR (2) KR101903923B1 (ru)
CN (1) CN102918810B (ru)
AU (1) AU2011256698B2 (ru)
BR (1) BR112012029427B1 (ru)
CA (1) CA2798124C (ru)
HK (1) HK1180853A1 (ru)
RU (1) RU2569806C2 (ru)
WO (1) WO2011146232A2 (ru)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013152702A (ja) * 2011-12-28 2013-08-08 Canon Marketing Japan Inc 情報処理装置、情報処理方法、及びコンピュータプログラム

Families Citing this family (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE112012000358B4 (de) * 2011-03-02 2019-08-14 International Business Machines Corporation Unternehmensübergreifender Datenaustausch
US9026784B2 (en) * 2012-01-26 2015-05-05 Mcafee, Inc. System and method for innovative management of transport layer security session tickets in a network environment
US9237168B2 (en) 2012-05-17 2016-01-12 Cisco Technology, Inc. Transport layer security traffic control using service name identification
CA3176188A1 (en) 2013-03-15 2014-09-15 Blackhawk Network, Inc. Using client certificates to communicate trusted information
US9853927B2 (en) 2013-08-27 2017-12-26 Microsoft Technology Licensing, Llc Enforcing resource quota in mail transfer agent within multi-tenant environment
US9565198B2 (en) 2014-01-31 2017-02-07 Microsoft Technology Licensing, Llc Tenant based signature validation
US10524122B2 (en) 2014-01-31 2019-12-31 Microsoft Technology Licensing, Llc Tenant based signature validation
MA41502A (fr) 2015-02-14 2017-12-19 Valimail Inc Validation centralisée d'expéditeurs d'email par ciblage de noms ehlo et d'adresses ip
US11843597B2 (en) * 2016-05-18 2023-12-12 Vercrio, Inc. Automated scalable identity-proofing and authentication process
US10554418B2 (en) 2016-06-24 2020-02-04 General Electric Company Routing cloud messages using digital certificates
US10326730B2 (en) 2016-06-27 2019-06-18 Cisco Technology, Inc. Verification of server name in a proxy device for connection requests made using domain names
US20180102992A1 (en) * 2016-10-11 2018-04-12 Microsoft Technology Licensing, Llc Controlling Permissions in a Communication System
US11363060B2 (en) * 2019-10-24 2022-06-14 Microsoft Technology Licensing, Llc Email security in a multi-tenant email service
CN113595863B (zh) * 2020-04-30 2023-04-18 北京字节跳动网络技术有限公司 一种分享邮件的显示方法、装置、电子设备和存储介质
DE102020212586A1 (de) * 2020-10-06 2022-04-07 Robert Bosch Gesellschaft mit beschränkter Haftung Verfahren und Vorrichtung zum Verarbeiten von mit über ein Bussystem übertragbaren Nachrichten assoziierten Daten

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203589A1 (en) 2002-07-11 2004-10-14 Wang Jiwei R. Method and system for controlling messages in a communication network
US20050210272A1 (en) 2003-11-17 2005-09-22 Fotta Keith A Method and apparatus for regulating unsolicited electronic mail
US20070162394A1 (en) 2004-02-12 2007-07-12 Iconix, Inc. Rapid identification of message authentication

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941304B2 (en) 1998-11-17 2005-09-06 Kana Software, Inc. Method and apparatus for performing enterprise email management
US6356937B1 (en) 1999-07-06 2002-03-12 David Montville Interoperable full-featured web-based and client-side e-mail system
US7249175B1 (en) * 1999-11-23 2007-07-24 Escom Corporation Method and system for blocking e-mail having a nonexistent sender address
US6990581B1 (en) 2000-04-07 2006-01-24 At&T Corp. Broadband certified mail
CN1288202A (zh) * 2000-06-23 2001-03-21 林海 一种防止垃圾电子邮件的方法
JP4319791B2 (ja) 2001-06-08 2009-08-26 パナソニック コミュニケーションズ株式会社 データ通信装置及びインターネットファクシミリ装置
AU2002351409A1 (en) * 2001-12-19 2003-07-09 Secluda Technologies, Inc. Message processor
JP2004064215A (ja) * 2002-07-25 2004-02-26 Casio Comput Co Ltd 電子メールシステム、電子メールのなりすまし送信防止方法及びなりすまし送信メールの受信防止方法
JP2004078845A (ja) 2002-08-22 2004-03-11 Pasuko:Kk 電子メール受信システム
US7469280B2 (en) 2002-11-04 2008-12-23 Sun Microsystems, Inc. Computer implemented system and method for predictive management of electronic messages
US7480287B2 (en) 2002-11-19 2009-01-20 Murata Kikai Kabushiki Kaisha Communication terminal device, communication method and electronic mail server
US7660989B2 (en) 2002-11-26 2010-02-09 Rpost International Limited System for, and method of, authenticating an electronic message to a recipient
US7085745B2 (en) * 2003-03-05 2006-08-01 Klug John R Method and apparatus for identifying, managing, and controlling communications
US20040181581A1 (en) 2003-03-11 2004-09-16 Michael Thomas Kosco Authentication method for preventing delivery of junk electronic mail
US20070005970A1 (en) * 2003-05-21 2007-01-04 Trupp Steven E E-mail authentication protocol or MAP
WO2004107700A1 (en) 2003-05-30 2004-12-09 Privasphere Gmbh System and method for secure communication
US7272853B2 (en) * 2003-06-04 2007-09-18 Microsoft Corporation Origination/destination features and lists for spam prevention
US20050102366A1 (en) * 2003-11-07 2005-05-12 Kirsch Steven T. E-mail filter employing adaptive ruleset
JP4574161B2 (ja) * 2003-11-17 2010-11-04 キヤノン株式会社 通信装置、その制御方法およびプログラム
US7698558B2 (en) 2003-11-21 2010-04-13 Rpost International Limited System for, and method of, providing the transmission, receipt and content of an e-mail message
US20050198508A1 (en) * 2004-03-04 2005-09-08 Beck Stephen H. Method and system for transmission and processing of authenticated electronic mail
US7721093B2 (en) * 2004-04-02 2010-05-18 Microsoft Corporation Authenticated exchange of public information using electronic mail
US20060048210A1 (en) 2004-09-01 2006-03-02 Hildre Eric A System and method for policy enforcement in structured electronic messages
US20060121880A1 (en) 2004-12-07 2006-06-08 Cowsar Lawrence C Method and apparatus for enabling authorized and billable message transmission between multiple communications environments
US9160755B2 (en) * 2004-12-21 2015-10-13 Mcafee, Inc. Trusted communication network
US8738708B2 (en) * 2004-12-21 2014-05-27 Mcafee, Inc. Bounce management in a trusted communication network
JP4601470B2 (ja) 2005-03-18 2010-12-22 富士通株式会社 電子メール転送方法及び装置
JP2008546317A (ja) * 2005-06-01 2008-12-18 グッドメール システムズ,インク. フロムヘッダの検証による電子メールのスタンピング
US8595814B2 (en) * 2005-12-13 2013-11-26 Google Inc. TLS encryption in a managed e-mail service environment
JP2007251242A (ja) * 2006-03-13 2007-09-27 Net Surf:Kk メールサーバー用プログラム及びメールサーバー用システム
US7493403B2 (en) * 2006-03-13 2009-02-17 Markmonitor Inc. Domain name ownership validation
US8201231B2 (en) 2007-02-21 2012-06-12 Microsoft Corporation Authenticated credential-based multi-tenant access to a service
US20080307226A1 (en) 2007-06-07 2008-12-11 Alcatel Lucent Verifying authenticity of e-mail messages
CN101374117A (zh) 2007-08-21 2009-02-25 华为技术有限公司 处理电子邮件的方法、电子邮件服务器和客户端
JP2009088717A (ja) * 2007-09-28 2009-04-23 Ntt Comware Corp 情報通信システム、通信端末、情報サーバ装置、通信プログラム、情報サービスプログラム、情報通信方法
US8381262B2 (en) * 2008-02-20 2013-02-19 Yahoo! Inc. Blocking of spoofed E-mail
AU2009299539B2 (en) * 2008-10-01 2016-01-28 Network Box Corporation Limited Electronic communication control
US20100274856A1 (en) * 2009-04-24 2010-10-28 International Business Machines Corporation Managing oversized messages
US8856525B2 (en) * 2009-08-13 2014-10-07 Michael Gregor Kaplan Authentication of email servers and personal computers
US8327157B2 (en) * 2010-02-15 2012-12-04 Vistech LLC Secure encrypted email server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040203589A1 (en) 2002-07-11 2004-10-14 Wang Jiwei R. Method and system for controlling messages in a communication network
US20050210272A1 (en) 2003-11-17 2005-09-22 Fotta Keith A Method and apparatus for regulating unsolicited electronic mail
US20070162394A1 (en) 2004-02-12 2007-07-12 Iconix, Inc. Rapid identification of message authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2572328A4

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013152702A (ja) * 2011-12-28 2013-08-08 Canon Marketing Japan Inc 情報処理装置、情報処理方法、及びコンピュータプログラム
JP2014180007A (ja) * 2011-12-28 2014-09-25 Canon Marketing Japan Inc 情報処理装置、情報処理方法、及びコンピュータプログラム

Also Published As

Publication number Publication date
RU2569806C2 (ru) 2015-11-27
BR112012029427A2 (pt) 2017-02-21
KR101784756B1 (ko) 2017-10-12
CN102918810B (zh) 2016-05-11
JP2013528301A (ja) 2013-07-08
CA2798124C (en) 2017-09-26
AU2011256698B2 (en) 2014-05-29
EP2572328A4 (en) 2014-03-19
EP2572328B1 (en) 2018-07-25
AU2011256698A1 (en) 2012-12-13
BR112012029427B1 (pt) 2020-11-03
US9253126B2 (en) 2016-02-02
JP6092098B2 (ja) 2017-03-08
CA2798124A1 (en) 2011-11-24
EP2572328A2 (en) 2013-03-27
HK1180853A1 (zh) 2013-10-25
KR101903923B1 (ko) 2018-10-02
KR20170118941A (ko) 2017-10-25
US8707420B2 (en) 2014-04-22
WO2011146232A3 (en) 2012-01-19
RU2012149431A (ru) 2014-05-27
KR20130077822A (ko) 2013-07-09
US20140229562A1 (en) 2014-08-14
CN102918810A (zh) 2013-02-06
US20110289581A1 (en) 2011-11-24

Similar Documents

Publication Publication Date Title
US9253126B2 (en) Trusted e-mail communication in a multi-tenant environment
US20220014543A1 (en) Using a measure of influence of sender in determining a security risk associated with an electronic message
US7730145B1 (en) Anti-UCE system and method using class-based certificates
US8484456B2 (en) Trusted electronic messaging system
US20180139183A1 (en) Signed ephemeral email addresses
US20110113249A1 (en) Method and system for sharing trusted contact information
MXPA05011087A (es) Validacion de mensajes de entrada.
MXPA05014002A (es) Lista segura de emisor seguridad.
US20070255815A1 (en) Software, Systems, and Methods for Secure, Authenticated Data Exchange
US9967242B2 (en) Rich content scanning for non-service accounts for email delivery
US9866391B1 (en) Permissions based communication
US9887950B2 (en) Validating E-mails using message posting services
Martin et al. Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows
EP3962035B1 (en) Processing external messages using a secure email relay
Zhao et al. An add-on end-to-end secure email solution in mobile communications
van Hove et al. Your Vulnerability Disclosure Is Important To Us: An Analysis of Coordinated Vulnerability Disclosure Responses Using a Real Security Issue
Martin et al. RFC 7960: Interoperability Issues between Domain-based Message Authentication, Reporting, and Conformance (DMARC) and Indirect Email Flows
Tong et al. E-mail spoofing based on the datalink layers and its application to e-mail aggregation systems: is it possible to make good use of e-mail spoofing?
EP1788771A1 (en) System and method for handling electronic messages
WO2014054009A1 (en) Secure email messaging system and method
van Bekkum Standard for Transmission & Security 1.1
Hansen et al. DomainKeys Identified Mail (DKIM) Development, Deployment, and Operations
Hansen et al. RFC 5863: DomainKeys Identified Mail (DKIM) Development, Deployment, and Operations
AU2005242194A1 (en) A trusted electronic messaging system

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180025046.3

Country of ref document: CN

ENP Entry into the national phase

Ref document number: 2798124

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 9401/CHENP/2012

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 2012149431

Country of ref document: RU

Kind code of ref document: A

Ref document number: 20127030390

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2013512630

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2011783939

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2011256698

Country of ref document: AU

Date of ref document: 20110502

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11783939

Country of ref document: EP

Kind code of ref document: A2

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112012029427

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112012029427

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20121119